Unit 7 - Health Info Privacy, Confidentiality, Security, and Ethics Flashcards

1
Q

It is the right to left alone

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is the right to keep personal informations secret

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: We have the right to not disclose information you don’t want to disclosing

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The right to control personal information

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: Freedom from intrusion or invasion into one’s private
affair

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidential emails, Messages monitored by different company

These are examples of what?

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sharing or disseminating data only to those with a “need to know”

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F: It is acceptable to share information within authorized and involved people that helps in consulting/treating the patient for recovery

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The status accorded to data or information indicating that it is sensitive for some reason and therefore it needs to be protected

Confidentiality or Privacy

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“I know something about you, but since we are in the professional world I MUST NOT tell this information to other people”

Confidentiality or Privacy

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is stated in the HIV Law _______, that if you divulge the information to other people without the consent of the bearer of that laboratory result, you can be sanctioned or worse imprisoned/penalized

A

RA 8504

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss

Security, Confidentiality, Privacy

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There is already a certain person/group that has the initiative to know the ways to secure information from unauthorized uses, breached of systems, hacking and such

Security, Confidentiality, Privacy

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mechanisms to ensure the safety of data and systems in which the data reside

Security, Confidentiality, Privacy

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is advisable to log-out immediately after data retrieval to avoid hacking or unauthorized access

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 that works hand in hand?

A

Privacy, Confidentiality, Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mechanisms to ensure the safety of data and systems in which the data reside

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Where it needs to be protected against theft, disclosure, improper use or both, and must be disseminated only to authorized individuals or organizations with a need to know

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The result of effective protection measures;

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The sum of measures that safeguard data and computer programs from undesired occurrences and exposure

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Exposure to accidental or intentional disclosure to unauthorized persons

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Exposure to accidental or malicious alteration

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Exposure to unauthorized copying

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

Data Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Exposure to loss by theft or destruction by hardware failures, software deficiencies, operating mistakes, or physical damage by fire, water, smoke, excessive temperature, electrical failure or sabotage or combination thereof

a. Privacy
b. Confidentiality
c. Security
d. Data Security

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CHALLENGES FROM PROLIFERATION OF TECHNOLOGIES & APPLICATION:

T/F: New models of care require more care providers to access data across the patient care continuum

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

WHat do you call the favorite tactic of mass mailers of unsolicited advertisements, or junk e-mail. It has also been used by cyber-criminals to spread computer viruses or infiltrate many computer systems.

A

Spamming

29
Q

It is the practice of sending extremely critical, derogatory, and often vulgar e-mail messages* ( ____ mail) or newsgroup postings to other users on the Internet or online services.

A

Flaming

30
Q

Meaning of HIPAA

A

The Health Insurance Portability and Accountability Act

31
Q

It is a broad piece of legislation intended to address a wide variety of issues related to individual health insurance.

A

HIPAA

32
Q

Two important sections of HIPAA include the ____ rules and the _____ rules.

A

Privacy rules
Security rules

33
Q

“to protect the fundamental human rights of privacy, of communication while ensuring free flow of information to promote innovation and growth.”

Data Privacy Act of 2012

A

RA no. 10173

34
Q

A subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed

a. Personal Data Breach
b. Computer Crime

A

a

35
Q

Requirements of breach notification:

The breached information must be ______ personal information, or information that could be used for identify fraud

A

sensitive

36
Q

Requirements of breach notification:

There is a reasonable belief that _______ acquisition has occurred

A

unauthorized

37
Q

Requirements of breach notification:

The risk to the data subject is ____

A

real

38
Q

Requirements of breach notification:

The potential harm is _____.

A

serious

39
Q

Is defined by the Association of Information Technology Professionals (AITP)

a. Personal Data Breach
b. COmputer Crime

A

b

40
Q

In Computer Crime:

The _____ use, access, modification, and
destruction of hardware, software, data, or network
resources;

A

unauthorized

41
Q

In Computer Crime:

The unauthorized release of _______.

A

information

42
Q

In Computer Crime:

The unauthorized copying of _____.

A

software

43
Q

In Computer Crime:

Denying an ____ _____ access to his or her own hardware, software, data, or network resources;

A

end user

44
Q

In Computer Crime:

Using or conspiring to use computer or network resources to obtain information or tangible property ______.

A

illegally

45
Q

7 KEY FEATURES OF A SECURE SYSTEM & NETWORK

A

Autheentication
Authorization & Access control
Data Integrity
Accountability
Availability
Data Storage
Data Transmission

46
Q

Means of verifying the correct identity and/or group membership of individuals or other entities

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

a

47
Q

Methods for authentication are:
o User name
o Known only by the user (e.g. password)
o Held only by the user (e.g., digital signature, secure ID)
o Attributable only to the user (e.g.; finger print, retinal scan)

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

a

48
Q

Access control lists for predefined users

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

b

49
Q

Reading, Writing, Modifications, Deletion of data, Deletion of programs

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

b

50
Q

Used to support information accuracy to ensure that data have not been altered or destroyed in an unauthorized manner

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

C.

51
Q

Error detection and error correction protocols

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

C

52
Q

Ensures that the actions of any entity can be traced during the movement of data from its source to its recipient

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

D.

53
Q

Audit trails

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

D.

54
Q

Identification of the user, Data source, Whose information, Date and time, Nature of the activity

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

D.

55
Q

Ensures information is immediately accessible and usable by authorized entity

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

E.

56
Q

Methods: Back ups, Protecting and restricting access, Protecting against viruses

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

E.

57
Q

Protecting and maintaining the physical location of the data and the data itself

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

F.

58
Q

Physical protection of processors, storage media, cables, terminals, and workstations

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

F.

59
Q

Retention of data for mandated period of time

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

F

60
Q

Exchange of data between person and program or program and program when the sender and receiver are remote form one another

a. Authentication
b. Authorization & Access control
c. Data Integrity
d. Accountability
e. Availability
f. Data Storage
g. Data Transmission

A

G

61
Q

Under Data Transmission:
o Scrambles readable information
o De-encrypt with proper key by recipient

a. Encryption
b. Firewall

A

a

62
Q

Under Data Transmission:
- Filtering mechanism so that authorized traffic is allowed to pass

a. Encryption
b. Firewall

A

B

63
Q

Principles of Technology Ethics:
The good achieved by the technology must outweigh the harm or risk.

a. Proportionality
b. Informed Consent
c. Justice
d. Minimized risk

A

A

64
Q

Principles of Technology Ethics:
Those affected by the technology should understand and accept the risks

a. Proportionality
b. Informed Consent
c. Justice
d. Minimized risk

A

B

65
Q

In Proportionality is it true that there must be no alternative that achieves the same or comparable benefits with less harm or risk

A

True

66
Q

The benefits and burdens of the technology should be distributed fairly.

a. Proportionality
b. Informed Consent
c. Justice
d. Minimized risk

A

C

67
Q

Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk

a. Proportionality
b. Informed Consent
c. Justice
d. Minimized risk

A

C

68
Q

Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk

a. Proportionality
b. Informed Consent
c. Justice
d. Minimized risk

A

D